default search action
Yulai Xie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Fang Ren, Yulai Xie, Xiaoning Pi, Xiaohui Wang:
Bridge the gap between simulated and real-world data in optical fiber mode decomposition for accuracy improvement: A deep learning-based co-learning framework with visual similarity-based matching. Expert Syst. Appl. 256: 124937 (2024) - [j28]Wei Jiang, Hao Jiang, Yulai Xie, Jing Wu, Xiaofan He, Hao Li, Pan Zhou:
SatShield: In-Network Mitigation of Link Flooding Attacks for LEO Constellation Networks. IEEE Internet Things J. 11(16): 27340-27355 (2024) - [j27]Yulai Xie, Jingjing Niu, Yang Zhang, Fang Ren:
Global-Shared Text Representation Based Multi-Stage Fusion Transformer Network for Multi-Modal Dense Video Captioning. IEEE Trans. Multim. 26: 3164-3179 (2024) - [j26]Jing Wu, Qimei Chen, Hao Jiang, Haozhao Wang, Yulai Xie, Wenzheng Xu, Pan Zhou, Zichuan Xu, Lixing Chen, Beibei Li, Xiumin Wang, Dapeng Oliver Wu:
Joint Power and Coverage Control of Massive UAVs in Post-Disaster Emergency Networks: An Aggregative Game-Theoretic Learning Approach. IEEE Trans. Netw. Sci. Eng. 11(4): 3782-3799 (2024) - [c15]Wen Yin, Jian Lou, Pan Zhou, Yulai Xie, Dan Feng, Yuhua Sun, Tailai Zhang, Lichao Sun:
Physical Backdoor: Towards Temperature-Based Backdoor Attacks in the Physical World. CVPR 2024: 12733-12743 - [i3]Wen Yin, Jian Lou, Pan Zhou, Yulai Xie, Dan Feng, Yuhua Sun, Tailai Zhang, Lichao Sun:
Physical Backdoor: Towards Temperature-based Backdoor Attacks in the Physical World. CoRR abs/2404.19417 (2024) - 2023
- [j25]Yulai Xie, Shuai Tong, Pan Zhou, Yuli Li, Dan Feng:
Efficient Storage Management for Social Network Events Based on Clustering and Hot/Cold Data Classification. IEEE Trans. Comput. Soc. Syst. 10(1): 120-130 (2023) - [j24]Yafeng Wu, Yulai Xie, Xuelong Liao, Pan Zhou, Dan Feng, Lin Wu, Xuan Li, Avani Wildani, Darrell D. E. Long:
Paradise: Real-Time, Generalized, and Distributed Provenance-Based Intrusion Detection. IEEE Trans. Dependable Secur. Comput. 20(2): 1624-1640 (2023) - [j23]Erzhuo Shao, Zhenyu Han, Yulai Xie, Yang Zhang, Lu Geng, Yong Li:
Interior Individual Trajectory Simulation with Population Distribution Constraint. ACM Trans. Intell. Syst. Technol. 14(1): 2:1-2:17 (2023) - [j22]Zhenyu Han, Siran Ma, Changzheng Gao, Erzhuo Shao, Yulai Xie, Yang Zhang, Lu Geng, Yong Li:
Disease Simulation in Airport Scenario Based on Individual Mobility Model. ACM Trans. Intell. Syst. Technol. 14(5): 84:1-84:24 (2023) - [j21]Liangkang Zhang, Yulai Xie, Minpeng Jin, Pan Zhou, Gongming Xu, Yafeng Wu, Dan Feng, Darrell D. E. Long:
A Novel Hybrid Model for Docker Container Workload Prediction. IEEE Trans. Netw. Serv. Manag. 20(3): 2726-2743 (2023) - [c14]Die Hu, Yulai Xie, Dan Feng, Shixun Zhao, Pengyu Fu:
Internet Public Safety Event Grading and Hybrid Storage Based on Multi-feature Fusion for Social Media Texts. DASFAA (1) 2023: 578-587 - [c13]Xiaohui Wang, Yulai Xie, Yang Zhang, Xiaoning Pi, Fang Ren:
Digital Defect Simulation-based Data Generation for Visual Quality Inspection. ICCMS 2023: 119-125 - [c12]Yunbo Tao, Daizong Liu, Pan Zhou, Yulai Xie, Wei Du, Wei Hu:
3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D Point Cloud Attack. ICCV 2023: 14294-14304 - [i2]Yunbo Tao, Daizong Liu, Pan Zhou, Yulai Xie, Wei Du, Wei Hu:
3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D Point Cloud Attack. CoRR abs/2308.07546 (2023) - 2022
- [j20]Yulai Xie, Yang Zhang, Fang Ren:
Temporal-enhanced graph convolution network for skeleton-based action recognition. IET Comput. Vis. 16(3): 266-279 (2022) - [j19]Jingjing Niu, Yulai Xie, Yang Zhang, Jinyu Zhang, Yanfei Zhang, Xiao Lei, Fang Ren:
Tri-Modal Dense Video Captioning Based on Fine-Grained Aligned Text and Anchor-Free Event Proposals Generator. Int. J. Pattern Recognit. Artif. Intell. 36(12): 2255014:1-2255014:26 (2022) - [j18]Die Hu, Dan Feng, Yulai Xie:
EGC: A novel event-oriented graph clustering framework for social media text. Inf. Process. Manag. 59(6): 103059 (2022) - [j17]Zhuping Zou, Yulai Xie, Kai Huang, Gongming Xu, Dan Feng, Darrell D. E. Long:
A Docker Container Anomaly Monitoring System Based on Optimized Isolation Forest. IEEE Trans. Cloud Comput. 10(1): 134-145 (2022) - [j16]Yulai Xie, Minpeng Jin, Zhuping Zou, Gongming Xu, Dan Feng, Wenmao Liu, Darrell D. E. Long:
Real-Time Prediction of Docker Container Resource Load Based on a Hybrid Model of ARIMA and Triple Exponential Smoothing. IEEE Trans. Cloud Comput. 10(2): 1386-1401 (2022) - [j15]Yulai Xie, Jingjing Niu, Yang Zhang, Fang Ren:
Multisize Patched Spatial-Temporal Transformer Network for Short- and Long-Term Crowd Flow Prediction. IEEE Trans. Intell. Transp. Syst. 23(11): 21548-21568 (2022) - [c11]Yanfei Zhang, Yulai Xie, Yang Zhang, Yiruo Dai, Fang Ren:
VSSum: A Virtual Surveillance Dataset for Video Summary. ICCCV 2022: 113-119 - 2021
- [j14]Zeyue Xue, Pan Zhou, Zichuan Xu, Xiumin Wang, Yulai Xie, Xiaofeng Ding, Shiping Wen:
A Resource-Constrained and Privacy-Preserving Edge-Computing-Enabled Clinical Decision System: A Federated Reinforcement Learning Approach. IEEE Internet Things J. 8(11): 9122-9138 (2021) - [j13]Pan Zhou, Shimin Gong, Zichuan Xu, Lixing Chen, Yulai Xie, Changkun Jiang, Xiaofeng Ding:
Trustworthy and Context-Aware Distributed Online Learning With Autoscaling for Content Caching in Collaborative Mobile Edge Computing. IEEE Trans. Cogn. Commun. Netw. 7(4): 1032-1047 (2021) - [j12]Yulai Xie, Yafeng Wu, Dan Feng, Darrell D. E. Long:
P-Gaussian: Provenance-Based Gaussian Distribution for Detecting Intrusion Behavior Variants Using High Efficient and Real Time Memory Databases. IEEE Trans. Dependable Secur. Comput. 18(6): 2658-2674 (2021) - [j11]Pan Zhou, Yulai Xie, Ben Niu, Lingjun Pu, Zichuan Xu, Hao Jiang, Huawei Huang:
QoE-Aware 3D Video Streaming via Deep Reinforcement Learning in Software Defined Networking Enabled Mobile Edge Computing. IEEE Trans. Netw. Sci. Eng. 8(1): 419-433 (2021) - [c10]Daizong Liu, Xiaoye Qu, Jianfeng Dong, Pan Zhou, Yu Cheng, Wei Wei, Zichuan Xu, Yulai Xie:
Context-Aware Biaffine Localizing Network for Temporal Sentence Grounding. CVPR 2021: 11235-11244 - [c9]Yulai Xie, Yang Zhang, Fang Ren:
Temporal-Aware Graph Convolution Network for Skeleton-based Action Recognition. ICCCV 2021: 83-90 - [i1]Daizong Liu, Xiaoye Qu, Jianfeng Dong, Pan Zhou, Yu Cheng, Wei Wei, Zichuan Xu, Yulai Xie:
Context-aware Biaffine Localizing Network for Temporal Sentence Grounding. CoRR abs/2103.11555 (2021) - 2020
- [j10]Die Hu, Dan Feng, Yulai Xie, Gongming Xu, Xinrui Gu, Darrell D. E. Long:
Efficient Provenance Management via Clustering and Hybrid Storage in Big Data Environments. IEEE Trans. Big Data 6(4): 792-803 (2020) - [j9]Yulai Xie, Dan Feng, Yuchong Hu, Yan Li, Staunton Sample, Darrell D. E. Long:
Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments. IEEE Trans. Dependable Secur. Comput. 17(6): 1283-1296 (2020)
2010 – 2019
- 2019
- [j8]Xiaojie Fan, Lina Wang, Fang Ren, Yulai Xie, Xiang Lu, Yiying Zhang, Tianwen Zhangsun, Wei Chen, Jianping Wang:
Feature Fusion-Based Multi-Task ConvNet for Simultaneous Optical Performance Monitoring and Bit-Rate/Modulation Format Identification. IEEE Access 7: 126709-126719 (2019) - 2018
- [j7]Yulai Xie, Dan Feng, Xuelong Liao, Leihua Qin:
Efficient monitoring and forensic analysis via accurate network-attached provenance collection with minimal storage overhead. Digit. Investig. 26: 19-28 (2018) - [d1]Yulai Xie:
Detection rate and false alarm rate for Pagoda. IEEE DataPort, 2018 - 2017
- [j6]Guojin Liu, Zhenzhi Yin, Yunjian Jia, Yulai Xie:
Passenger flow estimation based on convolutional neural network in public transportation system. Knowl. Based Syst. 123: 102-115 (2017) - 2016
- [j5]Yulai Xie, Dan Feng, Yan Li, Darrell D. E. Long:
Oasis: An active storage framework for object storage platform. Future Gener. Comput. Syst. 56: 746-758 (2016) - [j4]Yulai Xie, Dan Feng, Zhipeng Tan, Junzhe Zhou:
Unifying intrusion detection and forensic analysis via provenance awareness. Future Gener. Comput. Syst. 61: 26-36 (2016) - 2013
- [j3]Yulai Xie, Kiran-Kumar Muniswamy-Reddy, Dan Feng, Yan Li, Darrell D. E. Long:
Evaluation of a Hybrid Approach for Efficient Provenance Storage. ACM Trans. Storage 9(4): 14 (2013) - [c8]Yulai Xie, Satoshi Kanai, Hiroaki Date:
Anatomy-Based Variational Modeling of Digital Hand and Its Verification. HCI (23) 2013: 384-392 - 2012
- [j2]Yulai Xie:
Review of applied algebra: codes, ciphers and discrete algorithms, by Darel W. Hardy, Fred Richman, and Carol L. Walker. SIGACT News 43(3): 25-27 (2012) - [c7]Yulai Xie, Dan Feng, Zhipeng Tan, Lei Chen, Kiran-Kumar Muniswamy-Reddy, Yan Li, Darrell D. E. Long:
A hybrid approach for efficient provenance storage. CIKM 2012: 1752-1756 - [c6]Yong Wan, Dan Feng, Fang Wang, Liang Ming, Yulai Xie:
An In-Depth Analysis of TCP and RDMA Performance on Modern Server Platform. NAS 2012: 164-171 - 2011
- [j1]Yulai Xie:
Some Results on Minimum Discrete Bending Energy Path in Simple Polygon. Comput. J. 54(7): 1205-1210 (2011) - [c5]Yulai Xie, Kiran-Kumar Muniswamy-Reddy, Dan Feng, Darrell D. E. Long, Yangwook Kang, Zhongying Niu, Zhipeng Tan:
Design and evaluation of Oasis: An active storage framework based on T10 OSD standard. MSST 2011: 1-12 - [c4]Yulai Xie, Kiran-Kumar Muniswamy-Reddy, Darrell D. E. Long, Ahmed Amer, Dan Feng, Zhipeng Tan:
Compressing Provenance Graphs. TaPP 2011 - 2010
- [c3]Jinhui Xu, Lei Xu, Yulai Xie:
Approximating Minimum Bending Energy Path in a Simple Corridor. ISAAC (1) 2010: 328-339
2000 – 2009
- 2007
- [c2]Yang Yang, Mingen Lin, Jinhui Xu, Yulai Xie:
Minimum Spanning Tree with Neighborhoods. AAIM 2007: 306-316 - 2006
- [c1]Yulai Xie, Jack Snoeyink, Jinhui Xu:
Efficient algorithm for approximating maximum inscribed sphere in high dimensional polytope. SCG 2006: 21-29
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint